|
[1] “Google Drive”, https://www.google.com.tw/ [2] “Dropbox”, https://www.dropbox.com/zh_TW/ [3] “OneDrive”, https://onedrive.live.com/about/zh-tw/ [4] “iCloud”, https://www.icloud.com/ [5] “NCUCCWiki”, http://wiki.cc.ncu.edu.tw/wiki/%E9%A6%96%E9%A0%81 [6] “SNIA IOTTA”, http://iotta.snia.org/ [7] Gwan-Hwan Hwang, Hung-Fu Chen “Efficient Real-time Auditing and Proof of Violation for Cloud Storage Systems,” 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 2016, Pages: 132 - 139 [8] S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Financial Cryptography and Data Security, Lecture Notes in Computer Science.Springer Berlin/Heidelberg, 2010, vol. 6054, pp. 136–149. [9] Gwan-Hwan Hwang, Wei-Sian Huang, and Jenn-Zjone Peng, “Realtime Proof of Violation for Cloud Storage,” The 6th IEEE International Conference on Cloud Computing Technology and Science (IEEE CloudCom 2014), December 27-29, 2014, Singapore. [10] “Amazon S3”, https://aws.amazon.com/tw/s3/ [11] “Azure”, https://azure.microsoft.com/zh-tw/ [12] Daniel Ellard, Jonathan Ledlie, Pia Malkani, Margo Seltzer, “Passive NFS Tracing of Email and Research Workloads,” FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies, March 31 – 31, 2003, San Francisco.
|